Skip to content

ci: use workflow from org actions #4

ci: use workflow from org actions

ci: use workflow from org actions #4

Triggered via pull request April 12, 2024 15:16
Status Failure
Total duration 33s
Artifacts

terraform-quality.yml

on: pull_request
terraform-quality  /  terraform-lint
18s
terraform-quality / terraform-lint
terraform-quality  /  terraform-security
20s
terraform-quality / terraform-security
Fit to window
Zoom out
Zoom in

Annotations

11 errors
terraform-quality / terraform-lint
Process completed with exit code 1.
terraform-quality / terraform-security: examples/asg/main.tf#L29
CKV_AWS_79: "Ensure Instance Metadata Service Version 1 is not enabled"
terraform-quality / terraform-security: examples/custom_role/main.tf#L29
CKV_AWS_79: "Ensure Instance Metadata Service Version 1 is not enabled"
terraform-quality / terraform-security: examples/custom_role/main.tf#L126
CKV_AWS_111: "Ensure IAM policies does not allow write access without constraints"
terraform-quality / terraform-security: examples/custom_role/main.tf#L126
CKV_AWS_356: "Ensure no IAM policies documents allow "*" as a statement's resource for restrictable actions"
terraform-quality / terraform-security: examples/rds/main.tf#L10
CKV_AWS_129: "Ensure that respective logs of Amazon Relational Database Service (Amazon RDS) are enabled"
terraform-quality / terraform-security: examples/rds/main.tf#L10
CKV_AWS_161: "Ensure RDS database has IAM authentication enabled"
terraform-quality / terraform-security: examples/rds/main.tf#L10
CKV_AWS_353: "Ensure that RDS instances have performance insights enabled"
terraform-quality / terraform-security: examples/rds/main.tf#L10
CKV_AWS_118: "Ensure that enhanced monitoring is enabled for Amazon RDS instances"
terraform-quality / terraform-security: examples/rds/main.tf#L10
CKV_AWS_293: "Ensure that AWS database instances have deletion protection enabled"
terraform-quality / terraform-security: examples/rds/main.tf#L10
CKV_AWS_157: "Ensure that RDS instances have Multi-AZ enabled"